end-to-end protocol

end-to-end protocol
протокол межконцевого обмена, межконцевой протокол

Англо-русский словарь по компьютерной безопасности. . 2011.

Игры ⚽ Нужна курсовая?

Смотреть что такое "end-to-end protocol" в других словарях:

  • Protocol spoofing — is used in data communications to improve performance in situations where an existing protocol is inadequate, for example due to long delays or high error rates.Note: In a computer security context, spoofing refers to various forms of… …   Wikipedia

  • End-to-end connectivity — is a property of the Internet that allows all nodes of the network to send packets to all other nodes of the network, without requiring intermediatenetwork elements to further interpret them. It was for the first time implemented in the CYCLADES… …   Wikipedia

  • Protocol of Corfu — Signed 17 May 1914 Location Corfu, Greece Signatories Principality of Albania …   Wikipedia

  • Protocol Independent Multicast — (PIM) is a family of multicast routing protocols that can provide one to many and many to many distribution of data over the Internet. The protocol independent part refers to the fact that PIM does not include its own topology discovery mechanism …   Wikipedia

  • End-to-end — has various meanings.*In e commerce, end to end marketing describes methods or services directly connecting people who want to sell and buy. This practice eliminates middlemen from the trade. *In computer communication, end to end refers to end… …   Wikipedia

  • End-to-end principle — The end to end principle is one of the central design principles of the Transmission Control Protocol (TCP) widely used on the Internet as well as in other protocols and distributed systems in general. The principle states that, whenever possible …   Wikipedia

  • Protocol converter — A Protocol Converter is a device used to convert standard or proprietary protocol of one device to the protocol suitable for the other device or tools to achieve the interoperability. There are varieties of protocols used in different fields like …   Wikipedia

  • Protocol-based intrusion detection system — A protocol based intrusion detection system (PIDS) is an intrusion detection system which is typically installed on a web server, and is used in the monitoring and analysis of the protocol in use by the computing system. A PIDS will monitor the… …   Wikipedia

  • Protocol (computing) — In computing, a protocol is a convention or standard that controls or enables the connection, communication, and data transfer between two computing endpoints. In its simplest form, a protocol can be defined as the rules governing the syntax,… …   Wikipedia

  • End-to-end auditable voting systems — Election technology Certification of voting machines Independent Testing Authority (ITA) NVLAP VVSG End to end auditable voting systems Help America Vote Act Indepen …   Wikipedia

  • Protocol of Sèvres — The Protocols of Sèvres (French, Protocoles de Sèvres ) was a secret agreement reached between the governments of Israel, France and Great Britain during discussions held in Sèvres, France between 22 and 24 October 1956, regarding a joint… …   Wikipedia


Поделиться ссылкой на выделенное

Прямая ссылка:
Нажмите правой клавишей мыши и выберите «Копировать ссылку»